Privacy threats in intimate relationships
نویسندگان
چکیده
منابع مشابه
Ideals in intimate relationships.
This research examined lay relationship and partner ideals in romantic relationships from both a social-cognitive and an evolutionary perspective. Studies 1 and 2 revealed that the qualities of an ideal partner were represented by 3 factors (partner warmth-trustworthiness, vitality-attractiveness, and status-resources), whereas the qualities of an ideal relationship were represented by 2 factor...
متن کاملSex differences in intimate relationships
Social networks based on dyadic relationships are fundamentally important for understanding of human sociality. However, we have little understanding of the dynamics of close relationships and how these change over time. Evolutionary theory suggests that, even in monogamous mating systems, the pattern of investment in close relationships should vary across the lifespan when post-weaning investm...
متن کاملPrivacy Threats in E-Shopping (Position Paper)
E-shopping has grown considerably in the last years, providing customers with convenience, merchants with increased sales, and financial entities with an additional source of income. However, it may also be the source of serious threats to privacy. In this paper, we review the e-shopping process, discussing attacks or threats that have been analyzed in the literature for each of its stages. By ...
متن کاملSecurity and privacy threats in IoT architectures
In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture, with attacker centric and system centric approaches. Our strong view is that IoT will be an important part of the global huge ICT infrastructure (“future Internet”) humanity will be strongly relying o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cybersecurity
سال: 2020
ISSN: 2057-2085,2057-2093
DOI: 10.1093/cybsec/tyaa006